Anomaly
Observations are basis in any informed-assessment to understand if operations are compliance to rules & regulations meeting the expected standards. Observations are used to support the finding in the report. They can be in the form of screenshots, photo, configuration files in plain text.
When you find anomalies, what is your first respond?
You have to double check if it is a false positive first. If it is valid, then check if exception process has been granted with valid reason and appropriate level of approval.
That is not yet the end. A more responsible cybersecurity practitioner or auditor shall also look at the effectiveness of the written directive - if they are reasonable and practically achievable. This is the hard part because it might outside the scope of assessment, or the assessor solely bases on the book.
In any cases, policy maker should look at the report and rethink if the written directives are too tight, too rigid in killing the business. Bear in...